scholarly journals Protocols for data-hiding based text document security and automatic processing

Author(s):  
F. Deguillaume ◽  
Y. Rytsar ◽  
S. Voloshynovskiy ◽  
T. Pun
2014 ◽  
Vol 8 (1L) ◽  
pp. 371-378 ◽  
Author(s):  
Debnath Bhattacharyya ◽  
Asmita Haveliya ◽  
Tai-hoon Kim

2019 ◽  
Vol 17 (71) ◽  
pp. 1-12
Author(s):  
Naseef Husam Mohammad ◽  
Ahmed Abdul-latief Mohammed

This paper, will overview the use of data hiding techniques in JPEG digital image file format. In particular, will describe how one can use Steganography to hide information in a JPEG digital image. This research will review of hiding data by using Least Significant Bit (LSB) as a method, and hiding a text (document) in a JPEG image as a media cover. This paper was implemented by using matlab to complete hiding data. Data hiding is a technique that is used to embed secret information into a cover media. However, the transmitted images may be compressed or not. When it is transmitted, an errors transmitting may occur. If such errors occurred, the receiver cannot extract the information correctly from the cover_image. Digital media have been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at anytime.


2019 ◽  
Vol E102.D (1) ◽  
pp. 41-47 ◽  
Author(s):  
Minoru KURIBAYASHI ◽  
Takuya FUKUSHIMA ◽  
Nobuo FUNABIKI

2013 ◽  
Vol 416-417 ◽  
pp. 1205-1209 ◽  
Author(s):  
Ping Feng Liu ◽  
Hua Wen Ai ◽  
Li Qi Ya

Digital watermarking provides a solution for protecting the copyright of digital contents, and print-and-scan resilient data hiding finds important applications in document security. In this paper, we propose a clustered dot halftone watermarking algorithm based on phase modulation. The watermark region and the other region use the threshold matrix for halftoning at the two different screen angle. The watermark is detected by overlaying the model, with one of the screen angle. Mean filtering and median filtering is performed on the recovered watermark to improve the appearance, and watermark is pre-processed using Arnold transformation to eliminate the edges in the border of the watermark. Experiments show watermark can appear under smearing, cropping and pint-and-scan attacks.


Sign in / Sign up

Export Citation Format

Share Document